Sciweavers

4377 search results - page 711 / 876
» Application Driven Software Development
Sort
View
CIIT
2004
132views Communications» more  CIIT 2004»
15 years 3 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
GRAPHICSINTERFACE
2004
15 years 3 months ago
Towards the Next Generation of Tabletop Gaming Experiences
In this paper we present a novel hardware and software platform (STARS) to realize computer augmented tabletop games that unify the strengths of traditional board games and comput...
Carsten Magerkurth, Maral Memisoglu, Timo Engelke,...
BSDCON
2003
15 years 3 months ago
An Automated Binary Security Update System for FreeBSD
With the present trend towards increased reliance upon computer systems, the provision and prompt application of security patches is becoming vital. Developers of all operating sy...
Colin Percival
LISA
2001
15 years 3 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
METMBS
2003
255views Mathematics» more  METMBS 2003»
15 years 3 months ago
Causal Explorer: A Causal Probabilistic Network Learning Toolkit for Biomedical Discovery
Causal Probabilistic Networks (CPNs), (a.k.a. Bayesian Networks, or Belief Networks) are well-established representations in biomedical applications such as decision support system...
Constantin F. Aliferis, Ioannis Tsamardinos, Alexa...